CN111860723A - Terminal management method based on two-dimensional code - Google Patents

Terminal management method based on two-dimensional code Download PDF

Info

Publication number
CN111860723A
CN111860723A CN202010714490.7A CN202010714490A CN111860723A CN 111860723 A CN111860723 A CN 111860723A CN 202010714490 A CN202010714490 A CN 202010714490A CN 111860723 A CN111860723 A CN 111860723A
Authority
CN
China
Prior art keywords
dimensional code
software
management
serial number
computer equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010714490.7A
Other languages
Chinese (zh)
Inventor
黄国滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Tax Software Technology Co ltd
Original Assignee
Jiangsu Tax Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Tax Software Technology Co ltd filed Critical Jiangsu Tax Software Technology Co ltd
Priority to CN202010714490.7A priority Critical patent/CN111860723A/en
Publication of CN111860723A publication Critical patent/CN111860723A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Abstract

The invention relates to a terminal management method, in particular to a terminal management method based on a two-dimensional code. The software management two-dimensional code can be produced by utilizing the hardware serial number and the identity identification information of the computer equipment, and when the software is started, the management server compares and checks the hardware serial number and the identity identification information, so that the cost for cracking the machine code is improved by utilizing the two-dimensional code technology, the authorization of computer equipment personnel bound on a client site (outside an enterprise) is strictly controlled, in addition, the client can conveniently feed back the product requirement, the terminal management can be realized, the effective protection on a software system in the terminal is realized, the application range is wide, and the safety and the reliability are realized.

Description

Terminal management method based on two-dimensional code
Technical Field
The invention relates to a terminal management method, in particular to a terminal management method based on a two-dimensional code.
Background
At present, most of commercial software and shared software adopt a registration code authorization mode to ensure that the software is not stolen so as to ensure the benefits of the software. Although some versions of many commonly used software systems have been hacked by others, the manner in which registration codes are authorized is an effective means of protecting the software system itself for the particular industry of software.
A so-called registration code is generally formed by a certain algorithm (i.e., a registrar) using a unique serial number of computer hardware as a registration source. A general program records a registration code by setting a global variable in the program.
However, the serial number and the registration code in the prior art can be bypassed, forged, cracked and the like by a certain technical means; in addition, a malicious person may fraudulently cheat the user through the registrar, causing a loss to the user and also a loss of reputation to the product provider.
In addition, when an enterprise product binds computer equipment, two scenes exist: 1. the computer installs and binds the computer equipment from the inside of the enterprise; 2. the customer site has a computer (outside the enterprise) self-contained, and the installation engineer on the customer site performs the product binding work.
Therefore, how to protect a software system more effectively is a technical problem to be solved urgently.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides a terminal management method based on two-dimensional codes, which can realize terminal management and achieve effective protection of a software system in a terminal, and has the advantages of wide application range, safety and reliability.
According to the technical scheme provided by the invention, the terminal management method based on the two-dimensional code comprises the following steps:
step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; in the computer equipment, generating a software management two-dimensional code by using a hardware serial number of the computer equipment and identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and the computer equipment transmits the hardware serial number and the identification information for generating the software management two-dimensional code to a management server to be stored by the management server;
step 2, when software of the software management two-dimensional code is started on computer equipment with the software management two-dimensional code, jumping out of the software management two-dimensional code so as to control the starting of the software by using the software management two-dimensional code;
step 3, scanning or identifying the software management two-dimensional code by using the user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting a hardware serial number of the computer equipment and identity identification information input by the user terminal to the management server;
and 4, the management server respectively verifies the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information, if the verification is passed, the management server allows the software to start, and otherwise, a prompt needing to be activated is output.
In step 1, the hardware serial number of the computer device comprises one or more of a serial number of a mainboard, a serial number of a network card and a serial number of a hard disk; the identity identification information comprises one or more of an identity card number, a mobile phone number and a employee number.
In step 1, the specific process of generating the software management two-dimensional code comprises the following steps:
step 1.1, encrypting a hardware serial number and identity identification information of the computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
and step 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol into a software management two-dimensional code by using a preset two-dimensional code generating component.
In step 3, the user terminal for scanning the code or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code.
In step 3, the computer equipment can allow the user feedback information to be written in, and transmits the user feedback information to the management server along with the hardware serial number and the identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number.
The invention has the advantages that: the software management two-dimensional code can be produced by utilizing the hardware serial number and the identity identification information of the computer equipment, and when the software is started, the management server compares and verifies the hardware serial number and the identity identification information, so that the cost for cracking the machine code is improved by utilizing the two-dimensional code technology, the authorization of computer equipment personnel bound on a client site (outside an enterprise) is strictly controlled, in addition, the client can conveniently feed back the product requirement, the terminal management can be realized, the effective protection on a software system in the terminal is realized, the application range is wide, and the safety and the reliability are realized.
Detailed Description
The present invention will be further described with reference to the following specific examples.
In order to realize terminal management and achieve effective protection of a software system in a terminal, the terminal management method comprises the following steps:
step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; in the computer equipment, generating a software management two-dimensional code by using a hardware serial number of the computer equipment and identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and the computer equipment transmits the hardware serial number and the identification information for generating the software management two-dimensional code to a management server to be stored by the management server;
specifically, the computer device and the management server may specifically adopt the existing commonly used form, generally, the computer device is a hardware device installed and used to be protected, the management server is a server related to the software to be protected, the management server can control the running of the software on the computer device, and the specific coordination relationship between the management server, the computer device and the software to be protected is consistent with the existing one, and is specifically known to those skilled in the art, and is not described herein again.
The hardware serial number of the computer equipment comprises one or more of a serial number of a mainboard, a serial number of a network card and a serial number of a hard disk; the identity identification information comprises one or more of an identity card number, a mobile phone number and a employee number. In the embodiment of the present invention, the person related to the computer device specifically refers to a person using the computer device, a person managing the computer device, or other persons specified to be related in practice, and is specifically known by those skilled in the art, and will not be described herein again.
The software management two-dimensional code is associated with software to be protected, specifically, when the software is started, the associated software management two-dimensional code can automatically jump out, or the software management two-dimensional code is directly displayed on a starting interface of the software.
Specifically, the specific process for generating the software management two-dimensional code includes the following steps:
step 1.1, encrypting a hardware serial number and identity identification information of the computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
in the embodiment of the invention, the encryption step comprises: encrypting the read hardware serial number of the computer equipment and the identity identification information of the mobile phone number, the employee number or the employee enterprise mailbox combination of the implementing personnel into a permission information character string by using a preset encryption key and an encryption algorithm; specifically, there are various processing schemes for encrypting the verified combined authentication information by using a preset encryption key and an encryption algorithm, for example, the encryption algorithm may adopt a 3DES symmetric encryption algorithm, and the preset encryption key is a 24-bit key required by adopting the 3DES symmetric encryption algorithm, which can be generated and provided by a designated system or a manager.
And step 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol into a software management two-dimensional code by using a preset two-dimensional code generating component.
In the embodiment of the invention, the encrypted product information is encapsulated into a two-dimensional code protocol according to a preset protocol rule, wherein the two-dimensional code protocol can adopt an XML message, and the specific format is as follows:
the encryption mode of < R > X </T > product type </T > product code </P > product name </M > implements personnel code </S > </D > customer area code </D > </R >;
wherein, R represents a two-dimension code protocol message root node; x represents an encryption mode, and the tag value of the product two-dimensional code is 1, which represents a 3DES encryption algorithm; t represents the product type, the tag value of the product two-dimensional code is the product type after 3DES encryption, and the encrypted product is only a numerical value or a letter; p represents a product code, the tag value of the product two-dimensional code is a product code encrypted by 3DES, and the product code is only a numerical value or a letter after encryption; m represents the product name, the tag value of the product two-dimensional code is the product name after 3DES encryption, and the product name is only a numerical value or a letter after encryption; s represents the implementer code, the tag value of the product two-dimensional code is the implementer code encrypted by 3DES, and the two-dimensional code is only a numerical value or a letter after encryption; d represents the client area code, the tag value of the special product two-dimensional code is the client area code encrypted by 3DES, and the encrypted value is only a numerical value or a letter.
And converting the two-dimension code protocol into a two-dimension code picture by using a preset two-dimension code generating component. The preset two-dimensional code generating component can be selected in various embodiments, for example, an open source component ZXing based on Google corporation can be selected, and a quick response matrix code is generated according to the text content of a two-dimensional code protocol, so that a software management two-dimensional code is generated, and the software management two-dimensional code is displayed for a user to scan.
Step 2, when software of the software management two-dimensional code is started on computer equipment with the software management two-dimensional code, jumping out of the software management two-dimensional code so as to control the starting of the software by using the software management two-dimensional code;
in the embodiment of the invention, when the software management two-dimensional code is jumped out or displayed, the key management two-dimensional code needs to be subjected to code scanning, identification and other processing, and the subsequent software can be started and run.
Step 3, scanning or identifying the software management two-dimensional code by using the user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting a hardware serial number of the computer equipment and identity identification information input by the user terminal to the management server;
in the embodiment of the invention, the user terminal for scanning the code or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code. Generally, after scanning or recognizing the software management two-dimensional code, identification information needs to be input, and at the same time, the computer device transmits a hardware serial number of the computer device and the identification information input by the user terminal to the management server, so that the management server performs a subsequent verification step. Specifically, after the two-dimensional code is managed by scanning or identifying the software, the software can automatically collect the hardware serial number of the computer equipment, so that the hardware serial number and the identification information input by the user terminal are transmitted to the management server under the condition that the hardware serial number of the current computer equipment is not required to be input.
And 4, the management server respectively verifies the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information, if the verification is passed, the management server allows the software to start, and otherwise, a prompt needing to be activated is output.
As can be seen from the above description, the management server stores in advance a hardware serial number of the computer device and identification information used when generating the software management two-dimensional code. After receiving a hardware serial number of the computer equipment transmitted after the terminal equipment scans the code or identifies the software management two-dimensional code and identity identification information input by the user terminal, the management server needs to compare the hardware serial number and the identity identification information one by one, the management server allows the software to be started and run only after the comparison is passed, otherwise, the management server prohibits the software from being started and returns a prompt to the computer equipment to be activated.
In the embodiment of the invention, the hardware serial numbers are compared, so that the software can be prevented from being stolen or cracked for use, and when the identity identification information is compared and checked, non-related personnel can be prevented from using computer equipment.
When the system is specifically implemented, the computer equipment can allow user feedback information to be written in, the user feedback information is transmitted to the management server along with the hardware serial number and the identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number. Of course, the user feedback information may also be written and fed back to the management server in the normal use of the software, and the specific manner may be selected according to actual needs, which is not described herein again.

Claims (5)

1. A terminal management method based on two-dimension codes is characterized by comprising the following steps:
step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; in the computer equipment, generating a software management two-dimensional code by using a hardware serial number of the computer equipment and identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and the computer equipment transmits the hardware serial number and the identification information for generating the software management two-dimensional code to a management server to be stored by the management server;
step 2, when software of the software management two-dimensional code is started on computer equipment with the software management two-dimensional code, jumping out of the software management two-dimensional code so as to control the starting of the software by using the software management two-dimensional code;
step 3, scanning or identifying the software management two-dimensional code by using the user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting a hardware serial number of the computer equipment and identity identification information input by the user terminal to the management server;
and 4, the management server respectively verifies the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information, if the verification is passed, the management server allows the software to start, and otherwise, a prompt needing to be activated is output.
2. The two-dimensional code-based terminal management method of claim 1, wherein: in step 1, the hardware serial number of the computer device comprises one or more of a serial number of a mainboard, a serial number of a network card and a serial number of a hard disk; the identity identification information comprises one or more of an identity card number, a mobile phone number and a employee number.
3. The two-dimensional code-based terminal management method of claim 1, wherein: in step 1, the specific process of generating the software management two-dimensional code comprises the following steps:
step 1.1, encrypting a hardware serial number and identity identification information of the computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
and step 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol into a software management two-dimensional code by using a preset two-dimensional code generating component.
4. The two-dimensional code-based terminal management method of claim 1, wherein: in step 3, the user terminal for scanning the code or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code.
5. The two-dimensional code-based terminal management method of claim 1, wherein: in step 3, the computer equipment can allow the user feedback information to be written in, and transmits the user feedback information to the management server along with the hardware serial number and the identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number.
CN202010714490.7A 2020-07-23 2020-07-23 Terminal management method based on two-dimensional code Pending CN111860723A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010714490.7A CN111860723A (en) 2020-07-23 2020-07-23 Terminal management method based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010714490.7A CN111860723A (en) 2020-07-23 2020-07-23 Terminal management method based on two-dimensional code

Publications (1)

Publication Number Publication Date
CN111860723A true CN111860723A (en) 2020-10-30

Family

ID=72950789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010714490.7A Pending CN111860723A (en) 2020-07-23 2020-07-23 Terminal management method based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN111860723A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112699422A (en) * 2020-12-29 2021-04-23 湖北省楚天云有限公司 Cloud platform terminal management method and system based on two-dimensional code
CN112738059A (en) * 2020-12-23 2021-04-30 迈普通信技术股份有限公司 Terminal access validity verification method and device, electronic equipment and storage medium
CN115865539A (en) * 2023-03-03 2023-03-28 新云网科技集团股份有限公司 Safety binding method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685093A (en) * 2011-12-08 2012-09-19 陈易 Mobile-terminal-based identity authentication system and method
CN105933353A (en) * 2016-07-05 2016-09-07 北京万维星辰科技有限公司 Method and system for realizing secure login
US20180302221A1 (en) * 2015-06-10 2018-10-18 Feitian Technologies Co., Ltd. Barcode security authentication method
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN110768839A (en) * 2019-10-30 2020-02-07 南宁市指搜信息技术有限公司 Third-party software authorization system based on intelligent device monitoring and user identity binding

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685093A (en) * 2011-12-08 2012-09-19 陈易 Mobile-terminal-based identity authentication system and method
US20180302221A1 (en) * 2015-06-10 2018-10-18 Feitian Technologies Co., Ltd. Barcode security authentication method
CN105933353A (en) * 2016-07-05 2016-09-07 北京万维星辰科技有限公司 Method and system for realizing secure login
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN110768839A (en) * 2019-10-30 2020-02-07 南宁市指搜信息技术有限公司 Third-party software authorization system based on intelligent device monitoring and user identity binding

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738059A (en) * 2020-12-23 2021-04-30 迈普通信技术股份有限公司 Terminal access validity verification method and device, electronic equipment and storage medium
CN112699422A (en) * 2020-12-29 2021-04-23 湖北省楚天云有限公司 Cloud platform terminal management method and system based on two-dimensional code
CN115865539A (en) * 2023-03-03 2023-03-28 新云网科技集团股份有限公司 Safety binding method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108200050B (en) Single sign-on server, method and computer readable storage medium
CN111860723A (en) Terminal management method based on two-dimensional code
CN100419737C (en) Application authentication system, secure device, and terminal device
EP1472583B1 (en) Method for supporting single sign on
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
CN108965222B (en) Identity authentication method, system and computer readable storage medium
CN101305375A (en) System and method for controlling distribution of electronic information
CN104756127A (en) Secure data handling by a virtual machine
CN101689237A (en) Activation system architecture
US20160337358A1 (en) Method for encoding an access to a computer resource
EP3683703A1 (en) System for authentification
US20010048359A1 (en) Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium
CN112464212A (en) Data authority control reconstruction method based on mature complex service system
CN112887340B (en) Password resetting method and device, service management terminal and storage medium
CN109598104A (en) Soft ware authorization based on timestamp and secret authentication file protects system and method
US8668139B2 (en) Method of protecting an individual&#39;s privacy when providing service based on electronic tag
US20030051145A1 (en) System for issuing and using secure cards
JPH10260939A (en) Client machine authentication method of computer network, client machine, host machine and computer system
RU2311676C2 (en) Method for providing access to objects of corporate network
US20080195545A1 (en) Method, system, and computer program product for using a personal communication device to obtain additional information
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
KR100753898B1 (en) System and method for login using an one time use password, smartcard having an one time use password process
JP2007179357A (en) Method for installing computer program
JP2005065035A (en) Substitute person authentication system using ic card
JP4565827B2 (en) Information processing apparatus for reading ID tag, program for reading ID tag, and program for writing to ID tag

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination